Sign in

On security arguments of the second round SHA-3 candidates.

Elena AndreevaAndrey BogdanovBart MenninkBart PreneelChristian Rechberger
Published in: Int. J. Inf. Sec. (2012)
Keyphrases